teambit / bit

A build system for development of composable software.
https://bit.dev
Other
17.82k stars 924 forks source link

Critical/High Security Vulnerabilities in Bit BVM Installation (Version 1.8.20) #9179

Closed harinlee0803 closed 1 week ago

harinlee0803 commented 1 week ago

I am encountering critical/high upstream security vulnerabilities in the latest version of Bit (v1.8.20) when using it in a self-hosted GitHub runner. The runner is based on a container image that installs Bit using the following command:

RUN npx @teambit/bvm install 1.8.20

After building and pushing the image to AWS ECR, AWS Inspector flagged multiple critical and high-severity vulnerabilities that appear to be coming from Bit's dependencies. Here’s a list of vulnerabilities identified:

Critical Severity:

High Severity:

Is there a plan to address these security issues in an upcoming release? Alternatively, is there a recommended approach for mitigating these vulnerabilities when using the Bit BVM installation?

itaymendel commented 1 week ago

hi,

bvm does not impact the application runtime not is actually used for a bit-server or a container. bvm is a tool that simplifies the installation of bit, so all these dependencies do not cause any impact on your infrastructure.

for your issue, we actually have a set of docker containers that have bit per-installed, so you do not have this impact at all - https://hub.docker.com/r/bitsrc/stable/tags

we are updating dependencies in bvm from time to time, to ensure warnings disappear, but as for this ticket - i prefer to close it, as it takes focus away from tickets that impact people who use bit.

GiladShoham commented 1 week ago

bvm 1.0.5 was just published The bvm package itself is now clean in terms of security issues.